CVE-2025-5619

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*

History

06 Jun 2025, 20:12

Type Values Removed Values Added
First Time Tenda
Tenda ch22
Tenda ch22 Firmware
CPE cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
CWE CWE-787
References () https://github.com/xubeining/Cve_report/blob/main/A%20remote%20code%20execution%20vulnerability%20in%20the%20router%20CH22%20V1.0.0.1%20manufactured%20by%20Shenzhen%20Jixiangtengda%20Technology%20Co.%2C%20Ltd.md - () https://github.com/xubeining/Cve_report/blob/main/A%20remote%20code%20execution%20vulnerability%20in%20the%20router%20CH22%20V1.0.0.1%20manufactured%20by%20Shenzhen%20Jixiangtengda%20Technology%20Co.%2C%20Ltd.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.311105 - () https://vuldb.com/?ctiid.311105 - Permissions Required
References () https://vuldb.com/?id.311105 - () https://vuldb.com/?id.311105 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.589179 - () https://vuldb.com/?submit.589179 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product

05 Jun 2025, 14:15

Type Values Removed Values Added
References () https://github.com/xubeining/Cve_report/blob/main/A%20remote%20code%20execution%20vulnerability%20in%20the%20router%20CH22%20V1.0.0.1%20manufactured%20by%20Shenzhen%20Jixiangtengda%20Technology%20Co.%2C%20Ltd.md - () https://github.com/xubeining/Cve_report/blob/main/A%20remote%20code%20execution%20vulnerability%20in%20the%20router%20CH22%20V1.0.0.1%20manufactured%20by%20Shenzhen%20Jixiangtengda%20Technology%20Co.%2C%20Ltd.md -
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en Tenda CH22 1.0.0.1. Este problema afecta a la función formaddUserName del archivo /goform/addUserName. La manipulación del argumento Password provoca un desbordamiento del búfer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

04 Jun 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 23:15

Updated : 2025-06-06 20:12


NVD link : CVE-2025-5619

Mitre link : CVE-2025-5619

CVE.ORG link : CVE-2025-5619


JSON object : View

Products Affected

tenda

  • ch22_firmware
  • ch22
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write